An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.
☆16Aug 28, 2015Updated 10 years ago
Alternatives and similar repositories for node-reverse-trojan
Users that are interested in node-reverse-trojan are comparing it to the libraries listed below
Sorting:
- an autodialer written in nodejs using the twilio api (not functional)☆11Mar 8, 2015Updated 11 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆15Jan 17, 2016Updated 10 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Mar 13, 2017Updated 9 years ago
- A small, fast, and efficient offline event log parser, registry reader, pcap file analyzer, IL decompiler (with ICSharpCode), and pagefil…☆18Mar 23, 2014Updated 11 years ago
- Execute nodejs through the browser (what could possibly go wrong)☆14Mar 12, 2018Updated 8 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Zero-Day Code Injection and Persistence Technique☆31Mar 23, 2017Updated 8 years ago
- A javascript single page application (SPA) driver for REST API payload management.☆17Jul 18, 2024Updated last year
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- Cross Distribution Exploit Testing☆28Sep 23, 2015Updated 10 years ago
- AlMA.PRO.SPY - An open-source Botnet.☆15Jul 25, 2017Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Sep 28, 2015Updated 10 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Apr 12, 2015Updated 10 years ago
- A fast and advanced ransomware PoC☆60Aug 24, 2015Updated 10 years ago
- simple reverse tcp backdoor hack☆63Oct 2, 2020Updated 5 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆22Sep 16, 2015Updated 10 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Full nodejs Remote Administration Tools with socket.io☆30Jun 11, 2017Updated 8 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- This is a cross-platform Python 2.x Remote Access Trojan (RAT)☆14Mar 11, 2017Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Apr 1, 2014Updated 11 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- ☆31May 10, 2016Updated 9 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- A proof-of-concept for a browser-based XSS-deliverable botnet which does not exploit browser vulnerabilities but instead sticks to the st…☆27Apr 20, 2014Updated 11 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Functions and other Code Snippets often found in Offensive Code or Malware☆22Apr 20, 2015Updated 10 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago